Babysitter Network Protocol Analysis Skill

Network protocol capture, analysis, and fuzzing capabilities

install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/protocol-analysis" ~/.claude/skills/a5c-ai-babysitter-network-protocol-analysis-skill && rm -rf "$T"
manifest: library/specializations/security-research/skills/protocol-analysis/SKILL.md
source content

Network Protocol Analysis Skill

Overview

This skill provides network protocol capture, analysis, and fuzzing capabilities for security research.

Capabilities

  • Capture and analyze pcap files
  • Write Wireshark dissectors (Lua)
  • Create Scapy packet crafting scripts
  • Execute network fuzzing with boofuzz
  • Parse protocol state machines
  • Generate protocol documentation
  • Support TLS/SSL analysis
  • Create network-based exploits

Target Processes

  • protocol-reverse-engineering.js
  • network-penetration-testing.js
  • malware-analysis.js
  • firmware-analysis.js

Dependencies

  • Wireshark/tshark
  • Scapy (Python)
  • boofuzz
  • tcpdump
  • nmap
  • Python 3.x

Usage Context

This skill is essential for:

  • Protocol reverse engineering
  • Network vulnerability research
  • C2 protocol analysis
  • Custom protocol fuzzing
  • Network-based exploit development

Integration Notes

  • Supports live capture and offline analysis
  • Can generate reproducible packet sequences
  • Integrates with protocol documentation tools
  • Supports encrypted traffic analysis (with keys)
  • Can create custom Wireshark dissectors